MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 504eb3ba676729d316c8f6639ae45b0be030124e0c3007e9edade3b57b49e708. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 504eb3ba676729d316c8f6639ae45b0be030124e0c3007e9edade3b57b49e708
SHA3-384 hash: d724c8bc7c5c8ca09251ce76c8476029540fcd52e459a151a40675a73eea4de159b5e46619dd4f0054afe04696d919ac
SHA1 hash: fa6e36d08a36f06c417af13a799cd4570357474c
MD5 hash: b5d1fc220f0ad4ae724a50f2a681716d
humanhash: victor-ink-hot-snake
File name:SecuriteInfo.com.Win32.GenKryptik.EKTR.2367
Download: download sample
Signature Gozi
File size:3'441'152 bytes
First seen:2020-05-18 16:43:45 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 4cf116229550a15d6e40c5e3e33565e8 (7 x Gozi)
ssdeep 98304:w3stBCV4uUbYDDhfV3y2YB88QWDyHtGDnfb11W0b2ZhLiUtKLjWU:wctBlUDS2R8JywrbT2ZfOW
Threatray 70 similar samples on MalwareBazaar
TLSH B3F58C017A81E025EAA91AB3CE68D5FD02157D54DF7490DB30D0BF8FBA7BAE69830711
Reporter SecuriteInfoCom
Tags:Gozi

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Danabot
Status:
Malicious
First seen:
2020-05-18 17:36:08 UTC
AV detection:
13 of 31 (41.94%)
Threat level:
  5/5
Result
Malware family:
danabot
Score:
  10/10
Tags:
family:danabot banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Blacklisted process makes network request
Danabot
Malware Config
C2 Extraction:
172.81.129.196
54.38.22.65
192.99.219.207
51.255.134.130
192.236.179.73
23.82.140.201
45.147.228.92
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments